May 7, 2024, 3:20 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Fifty-seven percent of more than 90,000 internet-exposed hosts continue to run TinyProxy instances unpatched against the critical use-after-free vulnerability, tracked as CVE-2023-49606, which could be leveraged to facilitate remote code execution attacks via an unauthenticated HTTP request, reports The Hacker News.


Article Link: Widespread RCE compromise likely with critical TinyProxy bug | SC Media


1 post - 1 participant


Read full topic

article attacks bug code code execution compromise continue critical cve exposed free hacker http internet link rce remote code remote code execution reports request run the hacker news tinyproxy unauthenticated unpatched use-after-free vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India

Cybersecurity Architect, Infrastructure & Technical Security

@ KCB Group | Kenya

Security Analyst SOC (m/w/d)

@ Deutsche Telekom | Bonn, Deutschland